1 Important issues for the future Adaptive and interorganizational workflows Wil van der Aalst Eindhoven University of Technology Faculty of Technology.

Slides:



Advertisements
Similar presentations
1 Analysis of workflows : Verification, validation, and performance analysis. Wil van der Aalst Eindhoven University of Technology Faculty of Technology.
Advertisements

CMSC 104, Version 8/061L04Algorithms1.ppt Algorithms, Part 1 of 3 Topics Definition of an Algorithm Algorithm Examples Syntax versus Semantics Reading.
By Philippe Kruchten Rational Software
Workflow Management Kap. 4. Analyzing Workflows Wil van der Aalst has copyrights to almost all figures in the following slideshow made by Lars Frank.
Design Concepts and Principles
Appendix A The Future of Workflows Wil van der Aalst has copyrights to almost all figures in the following slideshow made by Lars Frank.
/faculteit technologie management PN-1 Petri nets refresher Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Faculty of Technology Management,
Use-case Modeling.
Constraint-Based Workflow Models Change Made Easy! Maja Pesic Helen Schonenberg Natalia Sidorova Wil van der Aalst Eindhoven University of Technology.
1 Workflow Management Systems : Functions, architecture, and products. Wil van der Aalst Eindhoven University of Technology Faculty of Technology Management.
The Architecture Design Process
1 Analysis of workflows a-priori and a-posteriori analysis Wil van der Aalst Eindhoven University of Technology Faculty of Technology Management Department.
1 Modeling workflows : The organizational dimension and alternative notations. Wil van der Aalst Eindhoven University of Technology Faculty of Technology.
Requirements Analysis Concepts & Principles
Business Alignment Using Process Mining as a Tool for Delta Analysis Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department of Information.
Discovering Coordination Patterns using Process Mining Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department of Information and Technology.
Developing Dependable Systems CIS 376 Bruce R. Maxim UM-Dearborn.
(c) 2007 Mauro Pezzè & Michal Young Ch 1, slide 1 Software Test and Analysis in a Nutshell.
Testing an individual module
1 Software Requirements Specification Lecture 14.
8.1 Classes & Inheritance Inheritance Objects are created to model ‘things’ Sometimes, ‘things’ may be different, but still have many attributes.
Process Mining for Ubiquitous Mobile Systems An Overview and a Concrete Algorithm Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department.
Foundations This chapter lays down the fundamental ideas and choices on which our approach is based. First, it identifies the needs of architects in the.
Verification and Validation
What is Software Architecture?
Distributed Deadlocks and Transaction Recovery.
Workflow Management Kap. 1. Organizing Workflows
Why Analysis Process Refer to earlier chapters Models what the system will do makes it easier for understanding no environment considered (hence, system.
1 Object-Oriented Testing CIS 375 Bruce R. Maxim UM-Dearborn.
Objects and Components. The adaptive organization The competitive environment of businesses continuously changing, and the pace of that change is increasing.
Dynamic Choreographies Safe Runtime Updates of Distributed Applications Ivan Lanese Computer Science Department University of Bologna/INRIA Italy Joint.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 20 Object-Oriented.
Ch6: Software Verification. 1 Decision table based testing  Applicability:  Spec. is described by a decision table.  Tables describe:  How combinations.
1 (Re)designing workflows Tips and tricks. Wil van der Aalst Eindhoven University of Technology Faculty of Technology Management Department of Information.
Workflow/Business Process Management Introduction business process management and workflow management Wil van der Aalst Eindhoven University of Technology.
Testing -- Part II. Testing The role of testing is to: w Locate errors that can then be fixed to produce a more reliable product w Design tests that systematically.
Black Box Testing Focuses in the functional requirements of the program It is not an alternative to white-box techniques It is a complementary approach.
1 Analysis of workflows : Verification, validation, and performance analysis. Wil van der Aalst Eindhoven University of Technology Faculty of Technology.
Algorithms, Part 1 of 3 Topics  Definition of an Algorithm  Algorithm Examples  Syntax versus Semantics Reading  Sections
Chapter 16 Recovery Yonsei University 1 st Semester, 2015 Sanghyun Park.
Chapter 8 Object Design Reuse and Patterns. Object Design Object design is the process of adding details to the requirements analysis and making implementation.
Petri nets refresher Prof.dr.ir. Wil van der Aalst
Lecture 13 Advanced Transaction Models. 2 Protocols considered so far are suitable for types of transactions that arise in traditional business applications,
Inheritance in Petri Net Designs. Goals Subtyping - interface inheritance: Can the subclass use or conform to the interface of the superclass?). Projection.
Chapter 10 Recovery System. ACID Properties  Atomicity. Either all operations of the transaction are properly reflected in the database or none are.
16/11/ Web Services Choreography Requirements Presenter: Emilia Cimpian, NUIG-DERI, 07April W3C Working Draft.
Testing OO software. State Based Testing State machine: implementation-independent specification (model) of the dynamic behaviour of the system State:
1 Joint work with Claudio Antares Mezzina and Jean-Bernard Stefani Controlled Reversibility and Compensations Ivan Lanese Focus research group Computer.
Dr. Rebhi S. Baraka Advanced Topics in Information Technology (SICT 4310) Department of Computer Science Faculty of Information Technology.
1 Modeling workflows : The organizational dimension and alternative notations. Wil van der Aalst Eindhoven University of Technology Faculty of Technology.
Chapter 5 System Modeling. What is System modeling? System modeling is the process of developing abstract models of a system, with each model presenting.
/faculteit technologie management PN-1 Petri nets refresher Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Faculty of Technology Management,
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 4 Slide 1 Software Processes.
Fall 2002CS/PSY UI Design Principles Categories  Learnability Support for learning for users of all levels  Flexibility Support for multiple ways.
Banaras Hindu University. A Course on Software Reuse by Design Patterns and Frameworks.
1 UMBC CMSC 104, Section Fall 2002 Algorithms, Part 1 of 3 Topics Definition of an Algorithm Algorithm Examples Syntax versus Semantics Reading.
A university for the world real R © 2009, Chapter 12 The Declare Service Maja Pesic Helen Schonenberg Wil M.P. van der Aalst.
Process Mining – Concepts and Algorithms Review of literature on process mining techniques for event log data.
About the Presentations
Wil van der Aalst Eindhoven University of Technology
Object-Oriented and Classical Software Engineering Sixth Edition, WCB/McGraw-Hill, 2005 Stephen R. Schach
Wil van der Aalst Eindhoven University of Technology
Wil van der Aalst Eindhoven University of Technology
Workflow Management Systems: Functions, architecture, and products.
Wil van der Aalst Eindhoven University of Technology
Petri nets refresher Prof.dr.ir. Wil van der Aalst
Wil van der Aalst Eindhoven University of Technology
Workflow Management Systems: Functions, architecture, and products.
Business Alignment Using Process Mining as a Tool for Delta Analysis
Software Development Process Using UML Recap
Presentation transcript:

1 Important issues for the future Adaptive and interorganizational workflows Wil van der Aalst Eindhoven University of Technology Faculty of Technology Management Department of Information and Technology P.O. Box MB Eindhoven The Netherlands

2 Adaptive workflow Workflows are subject to change. Expected exceptions can be handled in a predefined manner. However, this is very expensive! Unexpected exceptions cannot be handled using predefined mechanisms. Therefore it is important to consider workflows that adapt.

3 groupware adaptive workflow (production) workflow structured unstructured information centric process centric  freedom, flexibility  no support, no control, no MI  support, control, MI  limited freedom, no flexibility

4 Workflow Management task case resource work item = case + task activity = case + task + resource process dimension resource dimension case dimension Focus on process dimension and the interplay between cases and processes in the fourth dimension. change

5 Changes: type, scope, and time changes restart on-the-fly entry time structural individual proceed transfer extend replace re-order scope time type ad-hoc evolutionary

6 Individual changes Just one case is affected (ad-hoc change) Each case has a private process or change description Time of change: entry time –the process is fixed the moment the case starts on-the-fly –the process may change during the execution of the case

7 Structural changes Evolution: all future cases are affected (in principle) Cases share a common process description What to do with existing cases? backward recovery –all cases are aborted and restarted forward recovery –abort and handle outside system proceed (versions) –old cases are handled the old way –new cases are handled the new way transfer (dynamic change) –old cases are moved to the new process –not always possible!

8 Problem 1: Correctness Two types of correctness notions: syntactic –connectedness, termination, absence of livelock and deadlock –does not depend on the contents of tasks –soundness property semantic –contents of tasks is considered –performance: time and quality –conformance to: »specification »template »old process –using notions of structure, (bi)simulation, inheritance, observable behavior

9 Correctness (2) Another criterion to classify errors: transient –does not affect new cases –will disappear by ad-hoc problem solving –can be very expensive permanent –affects all new cases –will not disappear by itself –can be very expensive # # t t

10 Errors resulting from change transient permanent syntacticsemantic Typically, standard verification techniques only work for syntactic & permanent errors! Today’s workflow management systems do no support verification at all!  

11 Permanent/syntactic error

12 Transient/semantic problem

13 Dynamic change problem Structural change with case transfer Transfer of cases is not always possible See: [Ellis/Keddara/Rozenberg9], [Ellis/Keddara/Wainer98], [Agostini/Michelis98], [Voorhoeve/Aalst97], [Aalst/Basten/.. 99].

14 Problem 2: Management information In a workflow management system there are often multiple versions of one process. In case of evolutionary change there are only a few versions but in case of frequent ad-hoc changes thousands of versions (compare with variant BOM) may coexist. There is a need for aggregation: mapping all variants onto one process for a concise view on the workflow, I.e. a greatest common divisor or least common multiple! There is a need for abstraction: abstracting from details of the process(es) but still insight in future developments.

15

16 Interorganizational workflow E-commerce and virtual/extended enterprise result in interorganizational workflows Coordination/collaboration versus autonomy Frequent, distributed, and dynamic changes

17 Example

18 Example (contd.) public workflow

19 Example (contd.) partitioned workflow

20 Example (contd.) A causal relation is added between process_cost_statement and create_specification. From a local perspective this seem harmless. However, the resulting IOWF deadlocks! private workflow of the contractor

21 Example (contd.) An alternative design in harmony with the public workflow. private workflow of the contractor

22 Example (contd.) private workflow of the subcontractor The alternative procedure (procedure_2) may seem harmless from a local perspective. However, the external behavior changes!

23 Example (contd.) private workflow of the subcontractor An alternative design in harmony with the public workflow.

24 Example (contd.) overall workflow Combining the two original (i.e., incorrect) private workflows results in an overall workflow with potential deadlocks and a behavior different as agreed in the public workflow.

25 overall workflow

26 Case study: E-bookstore The processing of customer orders. Four domains: –customer, –bookstore, –publisher, –and shipper.

27 Step 1 public workflow

28 Step 2 partitioned workflow

29 Step 2 (contd.)

30 Step 2 (contd.)

31 Step 2 (contd.)

32 Step 2 (contd.)

33 Step 3 private workflow

34 Step 3 (contd.) private workflow

35 Step 3 (contd.) private workflow

36 The overall workflow is sound and a subclass of the public workflow!